SlideShare a Scribd company logo
Wikipedia Says
A Software that is developed either for a specific
organization or function that differs from or is
opposite of other already available software.
1.
2.
3.
4.

Initial Meeting
Detailed Proposal
Detailed Design
Agree Contract

5. Development
6. Delivery
7. System Completed
1.
2.
3.
4.
5.
6.

Maps to business processes
Takes existing processes into account
Only necessary features
Increasingly feasible
Oversee development
Own the software
1.
2.
3.
4.
5.

More expensive
First to try risk
Increased development time
Increased coordination
Involves iterations
Wikipedia Says
A software that is ready-made and available
for sale, lease, or license to the general public .
1. Problem identification
2. Vendor search
3. Value assessment

4. Vendor Comparison
5. Acquisition of service
6. Implementation
1.
2.
3.
4.
5.

Less expensive
No development time
Economies of scale
Proven technology / application
Community support
(many existing users)
1.
2.
3.
4.

Not unique to business processes
Vendor lock in
Unexpected future updates
Licensing problems
Packaged Software
• Choose packaged software for
1.
2.
3.
4.
5.

Commodity
Trivial operation
Integration
Non-strategic
Time and resource critical
Custom Software
• Choose custom software if:
– Niche
– Operationally critical
– Secluded
– Strategic
– Time and resource available
If you are looking for a bespoke software
development company which can
understand your business, develop
innovative software and offer exceptional
value for your money, then look no further
as this is what we do.
Schnell Solutions Limited
3 Earnshaw
Hitchin
SG5 4EZ
United Kingdom
Telephone:+44 (0)1462 835 787
E-mail: contact@schnellsolutions.com

Visit www.schnellsolutions.com

More Related Content

What's hot

[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
CODE BLUE
 
Fuzzing
FuzzingFuzzing
Open Source Licences
Open Source LicencesOpen Source Licences
Open Source Licences
Varuna Harshana
 
NextGen Server/Client Architecture - gRPC + Unity + C#
NextGen Server/Client Architecture - gRPC + Unity + C#NextGen Server/Client Architecture - gRPC + Unity + C#
NextGen Server/Client Architecture - gRPC + Unity + C#
Yoshifumi Kawai
 
[CB19] FileInsight-plugins: Decoding toolbox for malware analysis by 萬谷 暢崇
[CB19] FileInsight-plugins: Decoding toolbox for malware analysis by 萬谷 暢崇[CB19] FileInsight-plugins: Decoding toolbox for malware analysis by 萬谷 暢崇
[CB19] FileInsight-plugins: Decoding toolbox for malware analysis by 萬谷 暢崇
CODE BLUE
 
Practical Malware Analysis: Ch 4 A Crash Course in x86 Disassembly
Practical Malware Analysis: Ch 4 A Crash Course in x86 Disassembly Practical Malware Analysis: Ch 4 A Crash Course in x86 Disassembly
Practical Malware Analysis: Ch 4 A Crash Course in x86 Disassembly
Sam Bowne
 
Linux Kernel Exploitation
Linux Kernel ExploitationLinux Kernel Exploitation
Linux Kernel Exploitation
Scio Security
 
GraalVMで使われている、他言語をJVM上に実装する仕組みを学ぼう
GraalVMで使われている、他言語をJVM上に実装する仕組みを学ぼうGraalVMで使われている、他言語をJVM上に実装する仕組みを学ぼう
GraalVMで使われている、他言語をJVM上に実装する仕組みを学ぼう
Koichi Sakata
 
The TCP/IP Stack in the Linux Kernel
The TCP/IP Stack in the Linux KernelThe TCP/IP Stack in the Linux Kernel
The TCP/IP Stack in the Linux Kernel
Divye Kapoor
 
Virtual Machines - Virtual Box
Virtual Machines  - Virtual BoxVirtual Machines  - Virtual Box
Virtual Machines - Virtual Box
Lahiru Danushka
 
デモで楽しむ Visual Studio 2022 & .NET 6 最新アップデート
デモで楽しむ Visual Studio 2022 & .NET 6 最新アップデートデモで楽しむ Visual Studio 2022 & .NET 6 最新アップデート
デモで楽しむ Visual Studio 2022 & .NET 6 最新アップデート
Akira Inoue
 
技術紹介: S2E: Selective Symbolic Execution Engine
技術紹介: S2E: Selective Symbolic Execution Engine技術紹介: S2E: Selective Symbolic Execution Engine
技術紹介: S2E: Selective Symbolic Execution Engine
Asuka Nakajima
 
Virtual Machine Concept
Virtual Machine ConceptVirtual Machine Concept
Virtual Machine Concept
fatimaanique1
 
The Linux Kernel Implementation of Pipes and FIFOs
The Linux Kernel Implementation of Pipes and FIFOsThe Linux Kernel Implementation of Pipes and FIFOs
The Linux Kernel Implementation of Pipes and FIFOs
Divye Kapoor
 
FISL XIV - The ELF File Format and the Linux Loader
FISL XIV - The ELF File Format and the Linux LoaderFISL XIV - The ELF File Format and the Linux Loader
FISL XIV - The ELF File Format and the Linux Loader
John Tortugo
 
Linux basics
Linux basicsLinux basics
Linux basics
Santosh Khadsare
 
2018 Genivi Xen Overview Nov Update
2018 Genivi Xen Overview Nov Update2018 Genivi Xen Overview Nov Update
2018 Genivi Xen Overview Nov Update
The Linux Foundation
 
BuildKitによる高速でセキュアなイメージビルド (LT)
BuildKitによる高速でセキュアなイメージビルド (LT)BuildKitによる高速でセキュアなイメージビルド (LT)
BuildKitによる高速でセキュアなイメージビルド (LT)
Akihiro Suda
 
Arch linux
Arch linux Arch linux
Arch linux
Aniket Sinha
 
Zynq mp勉強会資料
Zynq mp勉強会資料Zynq mp勉強会資料
Zynq mp勉強会資料
一路 川染
 

What's hot (20)

[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
 
Fuzzing
FuzzingFuzzing
Fuzzing
 
Open Source Licences
Open Source LicencesOpen Source Licences
Open Source Licences
 
NextGen Server/Client Architecture - gRPC + Unity + C#
NextGen Server/Client Architecture - gRPC + Unity + C#NextGen Server/Client Architecture - gRPC + Unity + C#
NextGen Server/Client Architecture - gRPC + Unity + C#
 
[CB19] FileInsight-plugins: Decoding toolbox for malware analysis by 萬谷 暢崇
[CB19] FileInsight-plugins: Decoding toolbox for malware analysis by 萬谷 暢崇[CB19] FileInsight-plugins: Decoding toolbox for malware analysis by 萬谷 暢崇
[CB19] FileInsight-plugins: Decoding toolbox for malware analysis by 萬谷 暢崇
 
Practical Malware Analysis: Ch 4 A Crash Course in x86 Disassembly
Practical Malware Analysis: Ch 4 A Crash Course in x86 Disassembly Practical Malware Analysis: Ch 4 A Crash Course in x86 Disassembly
Practical Malware Analysis: Ch 4 A Crash Course in x86 Disassembly
 
Linux Kernel Exploitation
Linux Kernel ExploitationLinux Kernel Exploitation
Linux Kernel Exploitation
 
GraalVMで使われている、他言語をJVM上に実装する仕組みを学ぼう
GraalVMで使われている、他言語をJVM上に実装する仕組みを学ぼうGraalVMで使われている、他言語をJVM上に実装する仕組みを学ぼう
GraalVMで使われている、他言語をJVM上に実装する仕組みを学ぼう
 
The TCP/IP Stack in the Linux Kernel
The TCP/IP Stack in the Linux KernelThe TCP/IP Stack in the Linux Kernel
The TCP/IP Stack in the Linux Kernel
 
Virtual Machines - Virtual Box
Virtual Machines  - Virtual BoxVirtual Machines  - Virtual Box
Virtual Machines - Virtual Box
 
デモで楽しむ Visual Studio 2022 & .NET 6 最新アップデート
デモで楽しむ Visual Studio 2022 & .NET 6 最新アップデートデモで楽しむ Visual Studio 2022 & .NET 6 最新アップデート
デモで楽しむ Visual Studio 2022 & .NET 6 最新アップデート
 
技術紹介: S2E: Selective Symbolic Execution Engine
技術紹介: S2E: Selective Symbolic Execution Engine技術紹介: S2E: Selective Symbolic Execution Engine
技術紹介: S2E: Selective Symbolic Execution Engine
 
Virtual Machine Concept
Virtual Machine ConceptVirtual Machine Concept
Virtual Machine Concept
 
The Linux Kernel Implementation of Pipes and FIFOs
The Linux Kernel Implementation of Pipes and FIFOsThe Linux Kernel Implementation of Pipes and FIFOs
The Linux Kernel Implementation of Pipes and FIFOs
 
FISL XIV - The ELF File Format and the Linux Loader
FISL XIV - The ELF File Format and the Linux LoaderFISL XIV - The ELF File Format and the Linux Loader
FISL XIV - The ELF File Format and the Linux Loader
 
Linux basics
Linux basicsLinux basics
Linux basics
 
2018 Genivi Xen Overview Nov Update
2018 Genivi Xen Overview Nov Update2018 Genivi Xen Overview Nov Update
2018 Genivi Xen Overview Nov Update
 
BuildKitによる高速でセキュアなイメージビルド (LT)
BuildKitによる高速でセキュアなイメージビルド (LT)BuildKitによる高速でセキュアなイメージビルド (LT)
BuildKitによる高速でセキュアなイメージビルド (LT)
 
Arch linux
Arch linux Arch linux
Arch linux
 
Zynq mp勉強会資料
Zynq mp勉強会資料Zynq mp勉強会資料
Zynq mp勉強会資料
 

Viewers also liked

IT Depends: Custom vs Packaged Software
IT Depends: Custom vs Packaged SoftwareIT Depends: Custom vs Packaged Software
IT Depends: Custom vs Packaged Software
★ Selcuk Atli
 
Response to TIPs presentation - Dr. Grové Steyn - 12112013
Response to TIPs presentation -  Dr. Grové Steyn - 12112013Response to TIPs presentation -  Dr. Grové Steyn - 12112013
Response to TIPs presentation - Dr. Grové Steyn - 12112013
Centre for Competition, Regulation and Economic Development
 
Oswaldo Lorenzo - Degisim Yonetimi Uluslararasi En Iyi Uygulamalardan Faydala...
Oswaldo Lorenzo - Degisim Yonetimi Uluslararasi En Iyi Uygulamalardan Faydala...Oswaldo Lorenzo - Degisim Yonetimi Uluslararasi En Iyi Uygulamalardan Faydala...
Oswaldo Lorenzo - Degisim Yonetimi Uluslararasi En Iyi Uygulamalardan Faydala...
stratejikyonetisim
 
Case Studies - Bespoke Software Development and Bespoke Web Applications
Case Studies - Bespoke Software Development and Bespoke Web ApplicationsCase Studies - Bespoke Software Development and Bespoke Web Applications
Case Studies - Bespoke Software Development and Bespoke Web Applications
Schnell Solutions Limited
 
Skirt Weights
Skirt WeightsSkirt Weights
Skirt Weights
csshaw198
 
Nany
NanyNany
Nany
Aliani99
 
PresentationFINALNOWWWW
PresentationFINALNOWWWWPresentationFINALNOWWWW
PresentationFINALNOWWWW
csshaw198
 
Skills building training day 2 habits resistance and influencing for change
Skills building training day 2 habits resistance and influencing for changeSkills building training day 2 habits resistance and influencing for change
Skills building training day 2 habits resistance and influencing for change
stratejikyonetisim
 
Presentatie Marc Vrebos Ancienne Belgique 21-04-2016
Presentatie Marc Vrebos Ancienne Belgique 21-04-2016Presentatie Marc Vrebos Ancienne Belgique 21-04-2016
Presentatie Marc Vrebos Ancienne Belgique 21-04-2016
RdamFestivals
 
Raphael house presentation
Raphael house presentationRaphael house presentation
Raphael house presentation
Nicole Rogers
 
Presentation
PresentationPresentation
Presentation
csshaw198
 
PresentationFINAL
PresentationFINALPresentationFINAL
PresentationFINAL
csshaw198
 
Skirt Weights
Skirt WeightsSkirt Weights
Skirt Weights
csshaw198
 
Precentacion victimologia infantil
Precentacion victimologia infantilPrecentacion victimologia infantil
Precentacion victimologia infantil
maricruzla
 
Raphael house presentation
Raphael house presentationRaphael house presentation
Raphael house presentation
Nicole Rogers
 

Viewers also liked (15)

IT Depends: Custom vs Packaged Software
IT Depends: Custom vs Packaged SoftwareIT Depends: Custom vs Packaged Software
IT Depends: Custom vs Packaged Software
 
Response to TIPs presentation - Dr. Grové Steyn - 12112013
Response to TIPs presentation -  Dr. Grové Steyn - 12112013Response to TIPs presentation -  Dr. Grové Steyn - 12112013
Response to TIPs presentation - Dr. Grové Steyn - 12112013
 
Oswaldo Lorenzo - Degisim Yonetimi Uluslararasi En Iyi Uygulamalardan Faydala...
Oswaldo Lorenzo - Degisim Yonetimi Uluslararasi En Iyi Uygulamalardan Faydala...Oswaldo Lorenzo - Degisim Yonetimi Uluslararasi En Iyi Uygulamalardan Faydala...
Oswaldo Lorenzo - Degisim Yonetimi Uluslararasi En Iyi Uygulamalardan Faydala...
 
Case Studies - Bespoke Software Development and Bespoke Web Applications
Case Studies - Bespoke Software Development and Bespoke Web ApplicationsCase Studies - Bespoke Software Development and Bespoke Web Applications
Case Studies - Bespoke Software Development and Bespoke Web Applications
 
Skirt Weights
Skirt WeightsSkirt Weights
Skirt Weights
 
Nany
NanyNany
Nany
 
PresentationFINALNOWWWW
PresentationFINALNOWWWWPresentationFINALNOWWWW
PresentationFINALNOWWWW
 
Skills building training day 2 habits resistance and influencing for change
Skills building training day 2 habits resistance and influencing for changeSkills building training day 2 habits resistance and influencing for change
Skills building training day 2 habits resistance and influencing for change
 
Presentatie Marc Vrebos Ancienne Belgique 21-04-2016
Presentatie Marc Vrebos Ancienne Belgique 21-04-2016Presentatie Marc Vrebos Ancienne Belgique 21-04-2016
Presentatie Marc Vrebos Ancienne Belgique 21-04-2016
 
Raphael house presentation
Raphael house presentationRaphael house presentation
Raphael house presentation
 
Presentation
PresentationPresentation
Presentation
 
PresentationFINAL
PresentationFINALPresentationFINAL
PresentationFINAL
 
Skirt Weights
Skirt WeightsSkirt Weights
Skirt Weights
 
Precentacion victimologia infantil
Precentacion victimologia infantilPrecentacion victimologia infantil
Precentacion victimologia infantil
 
Raphael house presentation
Raphael house presentationRaphael house presentation
Raphael house presentation
 

Similar to Custom Software Vs. Packaged Software

SA Chapter 7
SA Chapter 7SA Chapter 7
SA Chapter 7
Nuth Otanasap
 
Software development life cycle
Software development life cycleSoftware development life cycle
Software development life cycle
divya1193
 
Chap05
Chap05Chap05
Chap05
Anne Badong
 
Agile software process
Agile software processAgile software process
Agile software process
Jennifer Polack
 
Four Steps to Creating an Effective Open Source Policy
Four Steps to Creating an Effective Open Source PolicyFour Steps to Creating an Effective Open Source Policy
Four Steps to Creating an Effective Open Source Policy
iasaglobal
 
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
Paris Open Source Summit
 
Top 7 Benefits of DevOps for Your Business.docx
Top 7 Benefits of DevOps for Your Business.docxTop 7 Benefits of DevOps for Your Business.docx
Top 7 Benefits of DevOps for Your Business.docx
Afour tech
 
Top 7 Benefits of DevOps for Your Business.docx
Top 7 Benefits of DevOps for Your Business.docxTop 7 Benefits of DevOps for Your Business.docx
Top 7 Benefits of DevOps for Your Business.docx
Afour tech
 
DevOps and Open Source Software Continuous Compliance
DevOps and Open Source Software Continuous ComplianceDevOps and Open Source Software Continuous Compliance
DevOps and Open Source Software Continuous Compliance
Source Code Control Limited
 
SE-Lecture 4 - Agile Software Development.pptx
SE-Lecture 4 - Agile Software Development.pptxSE-Lecture 4 - Agile Software Development.pptx
SE-Lecture 4 - Agile Software Development.pptx
TangZhiSiang
 
What is Devops?
What is Devops?What is Devops?
Common Licensing Layer Build and Assist
Common Licensing Layer Build and AssistCommon Licensing Layer Build and Assist
Common Licensing Layer Build and Assist
Flexera
 
Software development life cycle
Software development life cycleSoftware development life cycle
Software development life cycle
Afrasiyab Haider
 
Making software development processes to work for you
Making software development processes to work for youMaking software development processes to work for you
Making software development processes to work for you
Ambientia
 
Ch17
Ch17Ch17
Ch17
phanleson
 
Gdss gss and workgroups
Gdss gss and workgroupsGdss gss and workgroups
Gdss gss and workgroups
Yeimy Lorena Escobar R
 
Software Development Tips
Software Development TipsSoftware Development Tips
Software Development Tips
Sanganak Technologies
 
Se lec 3
Se lec 3Se lec 3
Se lec 3
Huda Alameen
 
Softweare Engieering
Softweare Engieering Softweare Engieering
Softweare Engieering
Huda Alameen
 
Introduction To Software Concepts Unit 1 & 2
Introduction To Software Concepts Unit 1 & 2Introduction To Software Concepts Unit 1 & 2
Introduction To Software Concepts Unit 1 & 2
Raj vardhan
 

Similar to Custom Software Vs. Packaged Software (20)

SA Chapter 7
SA Chapter 7SA Chapter 7
SA Chapter 7
 
Software development life cycle
Software development life cycleSoftware development life cycle
Software development life cycle
 
Chap05
Chap05Chap05
Chap05
 
Agile software process
Agile software processAgile software process
Agile software process
 
Four Steps to Creating an Effective Open Source Policy
Four Steps to Creating an Effective Open Source PolicyFour Steps to Creating an Effective Open Source Policy
Four Steps to Creating an Effective Open Source Policy
 
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
 
Top 7 Benefits of DevOps for Your Business.docx
Top 7 Benefits of DevOps for Your Business.docxTop 7 Benefits of DevOps for Your Business.docx
Top 7 Benefits of DevOps for Your Business.docx
 
Top 7 Benefits of DevOps for Your Business.docx
Top 7 Benefits of DevOps for Your Business.docxTop 7 Benefits of DevOps for Your Business.docx
Top 7 Benefits of DevOps for Your Business.docx
 
DevOps and Open Source Software Continuous Compliance
DevOps and Open Source Software Continuous ComplianceDevOps and Open Source Software Continuous Compliance
DevOps and Open Source Software Continuous Compliance
 
SE-Lecture 4 - Agile Software Development.pptx
SE-Lecture 4 - Agile Software Development.pptxSE-Lecture 4 - Agile Software Development.pptx
SE-Lecture 4 - Agile Software Development.pptx
 
What is Devops?
What is Devops?What is Devops?
What is Devops?
 
Common Licensing Layer Build and Assist
Common Licensing Layer Build and AssistCommon Licensing Layer Build and Assist
Common Licensing Layer Build and Assist
 
Software development life cycle
Software development life cycleSoftware development life cycle
Software development life cycle
 
Making software development processes to work for you
Making software development processes to work for youMaking software development processes to work for you
Making software development processes to work for you
 
Ch17
Ch17Ch17
Ch17
 
Gdss gss and workgroups
Gdss gss and workgroupsGdss gss and workgroups
Gdss gss and workgroups
 
Software Development Tips
Software Development TipsSoftware Development Tips
Software Development Tips
 
Se lec 3
Se lec 3Se lec 3
Se lec 3
 
Softweare Engieering
Softweare Engieering Softweare Engieering
Softweare Engieering
 
Introduction To Software Concepts Unit 1 & 2
Introduction To Software Concepts Unit 1 & 2Introduction To Software Concepts Unit 1 & 2
Introduction To Software Concepts Unit 1 & 2
 

Recently uploaded

AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Jeffrey Haguewood
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
GDSC PJATK
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
flufftailshop
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
alexjohnson7307
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 

Recently uploaded (20)

AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 

Custom Software Vs. Packaged Software